The Breach News

FIIG Securities Faces ASIC Lawsuit Following Significant Breach

The Australian Securities and Investments Commission (ASIC) has initiated legal proceedings against FIIG Securities Limited (FIIG), citing extensive and long-standing cybersecurity shortcomings. Filed in the Federal Court of Australia, the case underscores serious deficiencies in FIIG’s cybersecurity framework that persisted over a four-year span, culminating in a major data breach.…

Read MoreFIIG Securities Faces ASIC Lawsuit Following Significant Breach

Chinese Volt Typhoon Hackers Breached US Electric Utility Systems for Almost a Year

Cybersecurity firm Dragos recently disclosed a significant and prolonged cyber attack conducted by the Chinese threat actor known as Volt Typhoon, targeting the electric grid of the United States. The incident specifically involved the Littleton Electric Light and Water Departments (LELWD) in Massachusetts and unfolded over an extended period of…

Read MoreChinese Volt Typhoon Hackers Breached US Electric Utility Systems for Almost a Year

Investigation Launched by Levi & Korsinsky, LLP into Sunflower Medical Group, P.A. Data Breach – ACCESS Newswire

Sunflower Medical Group, P.A. Suffers Data Breach: Levi & Korsinsky, LLP Initiates Investigation In a concerning development, Sunflower Medical Group, P.A. has reported a significant data breach, prompting legal scrutiny from the firm Levi & Korsinsky, LLP. The breach has raised alarms regarding the potential exposure of sensitive patient information,…

Read MoreInvestigation Launched by Levi & Korsinsky, LLP into Sunflower Medical Group, P.A. Data Breach – ACCESS Newswire

Android Apps Containing North Korean Spyware Discovered on Google Play

Researchers have uncovered a concerning development involving several Android applications that were available on Google Play, despite passing the platform’s security checks. These apps have reportedly been functioning as surveillance tools, quietly transmitting sensitive user data to North Korean intelligence operatives. Identified as KoSpy by Lookout, the security firm responsible…

Read MoreAndroid Apps Containing North Korean Spyware Discovered on Google Play

CISA Withdraws Funding for State and Election Threat-Sharing Centers

Government, Incident & Breach Response, Industry Specific Cyber Defense Agency Cuts Funding for Critical Cybersecurity Resource Amid Shift in Federal Focus Chris Riotta (@chrisriotta) • March 12, 2025 The federal government has ceased funding for a hub that provided real-time cybersecurity threat intelligence to state and local governments. (Image: Shutterstock)…

Read MoreCISA Withdraws Funding for State and Election Threat-Sharing Centers

Stolen Credentials Rise to Primary Concern in Global Retail Industry

KnowBe4 has unveiled its “Global Retail Report 2025,” which highlights a concerning evolution in the tactics employed by cybercriminals targeting the retail industry. The report indicates that credential harvesting has emerged as the predominant threat, constituting 38% of all compromised data in 2023. In contrast, the theft of payment card…

Read MoreStolen Credentials Rise to Primary Concern in Global Retail Industry

A Guide to Using Signal Encrypted Messaging

Signal App Security Measures: Enhancing User Privacy for Business Professionals Recent updates to the messaging application Signal have introduced several security features aimed at reinforcing user privacy. These enhancements come as organizations and businesses grapple with the implications of data breaches and cyber threats. To navigate the settings on Signal,…

Read MoreA Guide to Using Signal Encrypted Messaging

Ransomware Groups Exploiting Weaknesses in Perimeter Security Appliances

Manufacturers of perimeter security appliances, which encompass devices like CCTV systems, firewalls, radar technologies, and access control solutions, have increasingly overlooked the need to embed strong security features into their products. This oversight leaves these devices vulnerable, contributing to a surge in ransomware incidents. A recent annual threat report published…

Read MoreRansomware Groups Exploiting Weaknesses in Perimeter Security Appliances